ABSTRACT
Security is a vital aspect of industrial control systems since they are used in critical infrastructures and manufacturing processes. As demonstrated by the increasing number of emerging exploits, securing such systems is still a challenge as the employed fieldbus technologies do not offer intrinsic support for basic security objectives. In this work we discuss some security aspects of DeviceNet, a communication protocol widely used for control applications especially in the North American industrial sector. Having the Controller Area Network (CAN) protocol at its base, DeviceNet inherits all the vulnerabilities that were already illustrated on CAN in-vehicle communication. We discuss how the lack of security in DeviceNet can be exploited and point on the fact that these vulnerabilities can be modelled by existing formal verification tools and countermeasures can be put in place.
- Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, et al. 2012. The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures. In Intl. Conf, on Tools and Algorithms for the Construction and Analysis of Systems. Springer, 267--282. Google ScholarDigital Library
- AUTOSAR 2017. Specification of Secure Onboard Communication (4.3.1 ed.). AUTOSAR.Google Scholar
- Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, et al. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces. In USENIX Security Symposium. Google ScholarDigital Library
- Samuel East, Jonathan Butts, Mauricio Papa, and Sujeet Shenoi. 2009. A Taxonomy of Attacks on the DNP3 Protocol. In Intl. Conf. on Critical Infrastructure Protection. Springer, 67--81.Google ScholarCross Ref
- Ryan Grandgenett, William Mahoney, and Robin Gandhi. 2015. Authentication Bypass and Remote Escalated I/O Command Attacks. In Proc. of the 10th Annual Cyber and Information Security Research Conf. ACM, New York, USA, 2:1--2:7. Google ScholarDigital Library
- Bogdan Groza and Pal-Stefan Murvay. 2018. Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks. IEEE Veh. Tech. Magazine 13, 1 (2018), 40--47.Google ScholarCross Ref
- Peter Huitsing, Rodrigo Chandia, Mauricio Papa, and Sujeet Shenoi. 2008. Attack taxonomies for the Modbus protocols. Intl. Journal of Critical Infrastructure Protection 1 (2008), 37--44.Google ScholarCross Ref
- Ralph Langner. 2013. To Kill a Centrifuge: A Technical Analysis of What Stuxnet's Creators Tried to Achieve. The Langner Group.Google Scholar
- Charlie Miller and Chris Valasek. 2013. Adventures in automotive networks and control units. DEF CON 21 (2013), 260--264.Google Scholar
- Pal-Stefan Murvay and Bogdan Groza. 2017. DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer. In 3rd International Workshop on Secure Software Engineering.Google ScholarDigital Library
- ODVA 2010. The CIP Networks Library Vol. 1: Common Industrial Protocol (CIP), Edition 3.9. ODVA.Google Scholar
- ODVA 2010. The CIP Networks Library Vol. 3: DeviceNet Adaptation of CIP, Edition 1.10. ODVA.Google Scholar
- ODVA. 2016. Optimization of Industrial Cybersecurity: ODVA's Vision for Securing the Flow of Data in Industrial Networks. ODVA.Google Scholar
- ODVA. 2016. Technology Overview Series: DeviceNet. ODVA.Google Scholar
- Robert Bosch GmbH 1991. CAN Specification, Version 2.0, Part A. Robert Bosch GmbH.Google Scholar
- Viktor Schiffer. 2016. Common Industrial Protocol (CIP) and the Family of CIP Networks. ODVA.Google Scholar
- Francisco Tacliad, Thuy D Nguyen, and Mark Gondree. 2017. DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing. In Proceedings of the 3rd Annual Industrial Control System Security Workshop. ACM, 24--31. Google ScholarDigital Library
- Mathieu Turuani. 2006. The CL-Atse protocol analyser. In Intl. Conf. on Rewriting Techniques and Applications. Springer, 277--286. Google ScholarDigital Library
- David Urbina, Jairo Alonso Giraldo, Nils Ole Tippenhauer, and Alvaro Cárdenas. 2016. Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed. In SG-CRC. Springer, 75--89.Google Scholar
- Marko Wolf, André Weimerskirch, and Christof Paar. 2004. Security in automotive bus systems. In Workshop on Embedded Security in Cars.Google Scholar
- Kim Zetter. 2016. Inside the cunning, unprecedented hack of Ukrain's power grid. https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/. {Online; accessed 1-July-2018}.Google Scholar
Index Terms
- A brief look at the security of DeviceNet communication in industrial control systems
Recommendations
Towards the protection of industrial control systems: conclusions of a vulnerability analysis of profinet IO
DIMVA'13: Proceedings of the 10th international conference on Detection of Intrusions and Malware, and Vulnerability AssessmentThe trend of introducing common information and communication technologies into automation control systems induces besides many benefits new security risks to industrial plants and critical infrastructures. The increasing use of Internet protocols in ...
A security test-bed for industrial control systems
MoSEMInA 2014: Proceedings of the 1st International Workshop on Modern Software Engineering Methods for Industrial AutomationIndustrial Control Systems (ICS) such as Supervisory Control And Data Acquisition (SCADA), Distributed Control Systems (DCS) and Distributed Automation Systems (DAS) control and monitor critical infrastructures. In recent years, proliferation of cyber-...
Comparative analysis of the security of configuration protocols for industrial control devices
Industrial control systems present security challenges, especially protocols that do not have security features and legacy systems that are often unpatched. Although the security of open standard protocols such as Modbus TCP has been extensively ...
Comments